SlideShare una empresa de Scribd logo
1 de 41
Biometrics and Aviation: Opportunities and Challenges Ben Rothke, CISSP, SITA Level 3 Senior Security Consultant BT Professional Services
About Me ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Biometrics Takeaways ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
People, Processes and Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why Do We Need Authentication?
Biometric Authentication, not Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Airport Biometric Success Story ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other airport biometric success stories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Airport Biometric Horror Stories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GAO on Biometrics in Aviation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Using Biometrics for Aviation Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004 ,[object Object],[object Object]
IRTPA - section 4011(a)(5) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regulations Governing Airport Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transportation Worker Identification Credential (TWIC) ,[object Object],[object Object],[object Object],[object Object],[object Object]
TWIC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Strategic Biometric Planning Legacy apps Risk Modeling Awareness Dev. Implementation Training Audit Define Drivers Regulatory Evaluation/ Testing Effective Biometric  Deployment Strategy Deployment Requirements
Biometric Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric Requirements, cont. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Features of Biometric Technologies Source:  Registered Traveler Program Policy and Implementation Issues  http://www.gao.gov/new.items/d03253.pdf   Technology characteristic Fingerprint Iris Facial Hand How it works Captures and compares fingertip patterns Captures and compares iris patterns Captures and compares facial patterns Measures and compares dimensions of hand and Fingers Cost of device Low High Moderate Moderate Enrollment time 3 minutes, 30 Seconds 2 minutes, 15 seconds About 3 minutes About 1 minute Transaction time 9 to 19 seconds 12 seconds 10 seconds 6 to 10 seconds False non-match rate .2%–36% 1.9%–6% 3.3%–70% 0%–5% False match rate 0%–8% Less than 1% 0.3%–5% 0%–2.1% User acceptance issues Associated with law enforcement, hygiene concerns User resistance, usage Difficulty Potential for privacy misuse Hygiene concerns Factors affecting Performance Dirty, dry, or worn Fingertips Poor eyesight, glare, or Reflections Lighting, orientation of face, and sunglasses Hand injuries, arthritis, Swelling Demonstrated Vulnerability Artificial fingers, reactivated latent prints High-resolution picture of iris Notebook computer with digital photographs None Variability with age Stable Stable Affected by aging Stable Commercial availability since 1970s 1997 1990s 1970s
Leading and Emerging Biometric Technologies  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management and Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Keep Asking Lots of Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric Reality ,[object Object],[object Object],[object Object]
End-user Resistance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Many People Can’t be Fingerprinted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End-User Education ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Biometric Roll-outs Fail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Making Biometrics Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
No Biometric is Suitable for Every Situation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Considerations ,[object Object],[object Object],[object Object]
Business,  not  technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effective Roll-out Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric Success Metrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TSA Qualified Products List (QPL) ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Q/A – Contact info ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a Ben Rothke Aoa 2008 Biometrics

Iata operational safety_audit_(iosa)
Iata operational safety_audit_(iosa)Iata operational safety_audit_(iosa)
Iata operational safety_audit_(iosa)
Bouchaib Dolla
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
fEngel
 

Similar a Ben Rothke Aoa 2008 Biometrics (20)

Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Iata operational safety_audit_(iosa)
Iata operational safety_audit_(iosa)Iata operational safety_audit_(iosa)
Iata operational safety_audit_(iosa)
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Aviation Software Development A “Best” Features List
Aviation Software Development A “Best” Features ListAviation Software Development A “Best” Features List
Aviation Software Development A “Best” Features List
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Modern technology used in airport security
Modern technology used in airport security Modern technology used in airport security
Modern technology used in airport security
 
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
 
NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Passenger Analytics: A Better Way to Manage Airports
Passenger Analytics: A Better Way to Manage AirportsPassenger Analytics: A Better Way to Manage Airports
Passenger Analytics: A Better Way to Manage Airports
 
Emerging technology: Delta biometrics
Emerging technology: Delta biometricsEmerging technology: Delta biometrics
Emerging technology: Delta biometrics
 

Más de Ben Rothke

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
 

Más de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Ben Rothke Aoa 2008 Biometrics

  • 1. Biometrics and Aviation: Opportunities and Challenges Ben Rothke, CISSP, SITA Level 3 Senior Security Consultant BT Professional Services
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Why Do We Need Authentication?
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Strategic Biometric Planning Legacy apps Risk Modeling Awareness Dev. Implementation Training Audit Define Drivers Regulatory Evaluation/ Testing Effective Biometric Deployment Strategy Deployment Requirements
  • 20.
  • 21.
  • 22. Important Features of Biometric Technologies Source: Registered Traveler Program Policy and Implementation Issues http://www.gao.gov/new.items/d03253.pdf Technology characteristic Fingerprint Iris Facial Hand How it works Captures and compares fingertip patterns Captures and compares iris patterns Captures and compares facial patterns Measures and compares dimensions of hand and Fingers Cost of device Low High Moderate Moderate Enrollment time 3 minutes, 30 Seconds 2 minutes, 15 seconds About 3 minutes About 1 minute Transaction time 9 to 19 seconds 12 seconds 10 seconds 6 to 10 seconds False non-match rate .2%–36% 1.9%–6% 3.3%–70% 0%–5% False match rate 0%–8% Less than 1% 0.3%–5% 0%–2.1% User acceptance issues Associated with law enforcement, hygiene concerns User resistance, usage Difficulty Potential for privacy misuse Hygiene concerns Factors affecting Performance Dirty, dry, or worn Fingertips Poor eyesight, glare, or Reflections Lighting, orientation of face, and sunglasses Hand injuries, arthritis, Swelling Demonstrated Vulnerability Artificial fingers, reactivated latent prints High-resolution picture of iris Notebook computer with digital photographs None Variability with age Stable Stable Affected by aging Stable Commercial availability since 1970s 1997 1990s 1970s
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.